f
MEDIDNA.001C1
Applicant
Appl. No.
Filed
For
PATENT
yi
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
Examiner
Benson et al.
Herewith
METHOD AND SYSTEM FOR
MANAGING A DATA
OBJECT SO AS TO COMPLY
WITH PREDETERMINED
CONDITIONS FOR USAGE
Unassigned
Group Art Unit Unassigned
PRELIMINARY AMENDMENT
Assistant Commissioner for Patents
Washington, D.C. 20231
Dear Sir:
Prior to an examination on the merits, please enter the amendments below.
'■ii
03
IN THF CLAIMS:
Please cancel Clai
ithout disclaimer or prejudice.
Please add the following new Claims 30-69 as follows:
55. A method of managing a data object so as to comply with control conditions for
usage of the data object, comprising:
providing a variable number of control conditions for usage of the data object;
providing a general set of control data for the data object based on the variable
number of control conditions for usage, the general set of control data comprising at least
one or more usage control elements defining usages of the data object which comply with
the variable number of control conditions;
combining the general set of control data with the data object; and
-1-
Appl. No. Unas^^d
Filed : Herewitn
encrypting the data object and the one or more usage control elements to create a
secure data package.
** yt. The method of Claim JK), additionally comprising encrypting together the data
object and the general set of control data.
i
3 The method of Claim ^0, wherein providing the general set of control data
includes providing an identifier which uniquely identifies the general set of control data.
The method of Claim ^0; wherein providing the general set of control data
includes providing a security control element which identifies a security process to be applied
before usage of the data object is allowed.
The method of Claim 30> wherein providing the general set of control data
includes providing a format control element which identifies the format of the control data.
u £5. The method of Claim ^0; additionally comprising:
receiving a request for authorization for usage by a user;
comparing the usage for which authorization is requested with the one or more
usage control elements of the general set of control data; and
granting the authorization if the usage for which authorization is requested
complies with the usages defined by the one or more usage control elements.
■* ^
36. The method of Claim 3^ additionally comprising requiring payment for the
requested authorization for usage before granting the authorization.
4 x 1
" Yl. The method of Claim additionally comprising:
transmitting the secure data package into a data processor;
Appl. No. Unas^^d
Filed : Herewith
checking, in response to a request by a user for usage of the data object, whether
the requested usage complies with the usage defined by the at least one usage control
element of the general set of control data; and
decrypting, in response to the requested usage complying with the usage defined
by the at least one usage control element of the general set of control data, the data object
so as to enable the requested usage.
* y(. The method of Claim yf 9 additionally comprising:
combining, after the usage of the data object, the data object and the one or more
usage control elements; and
reencrypting at least the data object and the one or more usage control elements.
A method of controlling the usage by a user of a data object so as to comply with
control conditions for usage of the data object, comprising:
providing a variable number of control conditions for usage of the data object;
providing a data package comprising a data object and control data, which
comprises at least one usage control element defining a usage of the data object which
complies with the variable number of control conditions, the data object and the at least
one usage control element being encrypted;
receiving a request by the user for usage of the data object;
decrypting the control data;
checking, in response to the request by the user for usage of the data object,
whether the requested usage complies with the usage defined by the at least one usage
control element of the control data; and
decrypting, in response to the requested usage complying with the usage defined
by the at least one usage control element of the control data, the data object and enabling
the requested usage.
li l °
40. The method of Claim 30, wherein the usage control element is updated after the at
least one usage of the data object.
-3-
Appl. No.
Filed
Unas.^^d
Herewith
* pf. The method of Claim )B, wherein the control data comprises an indication of the
number of times the user is authorized to use the data object in accordance with the at least one
usage control element, wherein the requested usage of the data object is only enabled when the
number of times is one or more, and wherein the number of times is decremented by one when
the requested usage is enabled.
I ^2. The method of Claim ^9, wherein the control data comprise a security control
element, and additionally comprising executing, before each usage of the data object, a security
procedure defined in the security control element.
\ #5. The method of Claim wherein checking whether the requested usage complies
with the usage defined by the at least one usage control element, comprises checking that a data
processor is capable of executing a security procedure specified in a security control element of
the at least one usage control element, and if not, disabling the usage.
#4. The method of Claim additionally comprising:
combining, after the usage of the data object, the data object and the one or more
usage control elements; and
reencrypting at least the data object and the one or more usage control elements.
1 A system for managing a data object so as to comply with control conditions for
usage of the data object, comprising:
a user interface module which receives a variable number of control conditions;
a packaging module which provides a general set of control data for the data
object based on the variable number of control conditions for usage, the general set of
control data comprising at least one or more usage control elements defining usages of
the data object which comply with the variable number of control conditions and which
combines the general set of control data with the data object; and
Appl. No. Unas^pd
Filed : Herewith
an encrypting module which encrypts the data object and at least the one or more
usage control elements to create a secure data package necessary.
}6. The system of Claim 4£ wherein the general set of control data comprises a
control data element which controls further distribution of the data object.
ff. The system of Claim 4£ wherein one of the usage control elements includes a
security control element that defines a security procedure.
fl. The system for controlling the usage by a user of a data object so as to comply
with control conditions for usage of the data object, comprising:
a usage manager module which receives a variable number of control conditions,
checks whether a usage requested by the user complies with the usage defined by at least
one usage control element that complies with the variable number of control conditions,
and disables the usage requested by the user when the usage does not comply with the
usage defined by the at least one usage control element; and
a decryption module which decrypts the at least one usage control element and the
data object
4°.
4$. The system of Claim 4£ wherein one of the usage control elements includes
security control element that defines a security procedure.
50. The system of Claim 4£ wherein the security procedure is an RSA encryption
algorithm.
54. The system of Claim 4%, wherein the usage manager module repackages the data
object after usage.
52. A method of controlling the usage by a user of data objects so as to comply with a
variable number of conditions for usage of the data objects, comprising:
-5-
Appl. No. Unas^^d
Filed : Herewith
providing at least two data packages, each data package comprising a data object
and a user set of control data, which comprises at least one usage control element
defining a usage of the data object which complies with the variable number of
conditions, the data object and the at least one usage control elements being encrypted;
decrypting the usage control elements of the user sets of control data;
examining the usage control elements of the at least two data packages to find a
match; and
performing an action being specified in the user sets of control data of the at least
two data packages.
53. The method of Claim &, wherein one of the at least two data packages is a sell
order, and wherein one of the at least two data packages is a buy order.
54. The method of Claim ft additionally comprising checking whether a data
processor is capable of executing a security procedure specified in a security control element of
the at least one usage control element, and disabling the usage when the data processor is not
capable of executing the security procedure.
^ . The method of Claim 52, additionally comprising:
updating the at least one usage control element of each data package;
combining after the usage of the data objects, each of the data objects and its at
least one usage control element;
reencrypting each of the combined data objects and its at least one usage control
element; and
transferring the repackaged data objects to their providers.
56. A method of managing a data object so as to comply with a variable number of
ontrol conditions for usage of the data object, comprising:
providing variable control conditions for usage of the data object;
AppLNo. Unas^pW
Filed : Herewith
providing a general set of control data for the data object based on the variable
control conditions for usage, the general set of control data comprising at least one or
more usage control elements defining usages of the data object which comply with the
variable control conditions;
providing, in response to a request for authorization for usage of the data object
by a user, a user set of control data, which comprises at least a subset of the general set of
control data, including at least one of the usage control elements;
combining the user set of control data with the data object;
encrypting at least the data object and the at least one of the usage control
elements of the user set of control data to create a secure data package; and
checking, before allowing transfer of the data package to the user, that the request
for authorization for usage of the data object has been granted.
yf. The method of Claim additionally comprising checking whether a data
processor is capable of executing a security procedure specified in a security control element of
the at least one usage control element, and disabling the usage when the data processor is not
capable of executing the security procedure.
ft &
p4. The method of Claim 5<£ wherein the data object is composed of at least two
constituent data objects and wherein the user set of control data, in response to a request for
authorization for usage of one of the constituent data objects by a user, is created only for that
constituent data object and combined only with a copy of that constituent data object.
«- £9. The method of Claim 5#, wherein the request for authorization is received from a
user via a data network.
The method of Claim wherein the data object is a composite data object
including at least two constituent data objects, and wherein providing a general set of control
data comprises providing a respective general set of control data for each of the constituent data
objects and the composite data object, and wherein providing a user set of control data comprises
Appl. No. Unas^^d
Filed : Herewith
providing a respective user set of control data for each of the constituent data objects and the
composite data object
p. The method as defined in Claim 5< additionally comprising storing the user set of
control data in a processor of a data object provider.
2>^£ The method as defined in Claim $6, additionally comprising:
transmitting the data package;
decrypting the at least one usage control element of the user set of control data;
checking, in response to a request by the user for usage of the data object, whether
the requested usage complies with the usage defined by the at least one usage control
element of the user set of control data; and
decrypting, in response to the requested usage complying with the usage defined
by the at least one usage control element of the user set of control data, the data object
and enabling the requested usage.
$ ■ I*
u 03. The method of Claim 5£ additionally comprising:
transmitting the data package;
decrypting the at least one usage control element of the user set of control data;
checking, in response to a request by the user for usage of the data object, whether
the requested usage complies with the usage defined by the at least one usage control
element of the user set of control data;
decrypting, in response to the requested usage complying with the usage defined
by the at least one usage control element of the user set of control data, the data object
and enabling the requested usage; and
combining, after the usage of the data object, the data object and the one or more
usage control elements of the user set of control data, and combining at least the data
object and the one or more usage of the user set of control data.
- A system for managing a data object so as to comply with control conditions for
usage of the data object, comprising:
-8-
Appl. No. Unas^^d
Filed : Herewith
a packaging module which provides a general set of control data for the data
object based on variable conditions for usage, the general set of control data comprising
at least one or more usage control elements defining usages of the data object which
comply with the variable conditions and which combines the user set of control data with
the data object, and wherein the packaging module provides in response to a request for
authorization for usage of the data object by a user, a user set of control data, which
comprises at least a subset of the general set of control data, which subset comprises at
least one of the usage control elements;
an encrypting module which encrypts the data object and at least the one or more
usage control elements of the user set of control data to create a secure data package,
which is ready for transfer to a user; and
a control module which checks that the request for authorization for usage of the
data object has been granted before allowing transfer of the data package to the user.
A method of managing a data object so as to comply with control conditions for
usage of the data object, comprising:
providing a general set of control data for the data object based on a variable
number of control conditions for usage, the general set of control data comprising at least
one or more usage control elements defining usages of the data object which comply with
the variable number of control conditions; and
encrypting the data object and the one or more usage control elements to create at
least one secure data package.
The method of Claim 0, wherein the data object and the usage control elements
are each encrypted into separate secure packages.
0. The method of Claim $5 y wherein providing the general set of control data
includes providing a security control element which identifies a security process to be applied
before usage of the data object is allowed.
-9-
Appl. No.
Filed
nas^^bd
Una
Herewith
'TO
7\ p8. The method of Claim wherein providing the general set of control data
includes providing a format control element which identifies the format of the control data.
T° 09. The method of Claim fg, additionally comprising:
/ receiving a request for authorization for usage by a user;
comparing the usage for which authorization is requested with the one or more
usage control elements of the general set of control data; and
granting the authorization if the usage for which authorization is requested
complies with the usages defined by the one or more usage control elements
Respectfully
kno:
TENS, OLSON & BEAR, LLP
li
Qi
Dated:
\o A /?g
By:
John M.ljCarson
Registration No. 34,303
Attorney of Record
620 Newport Center Drive
Sixteenth Floor
Newport Beach, CA 92660
(619) 235-8550
S:\DOCS\EMN\EMN-l 526JX)Okz9
060198
-10-